-
selsta
"give all hosts the same chance of being picked for connecting"
-
selsta
does this mean if someone runs multiple nodes on one IP they don’t have an advantage anymore?
-
moneromooo
Yes.
-
selsta
luigi1111: can you ban this person from the repo?
monero-project/monero #6940#issuecomment-717651602
-
selsta
keeps spamming
-
luigi1111w
done
-
wowario[m]
moneromooo: we are going to add these, tag, and release into the into the wild
git.wownero.com/wownero/wownero/compare/master...wowario:buttholes
-
wowario[m]
any other commits we should cherry-pick?
-
Snipa
.merges
-
xmr-pr
6886
-
moneromooo
wowario[m]: the full list is 6933 6935 6936 6939 6940 6942 6943
-
moneromooo
The dropping/banning is very slow though, you might want to increase it.
-
wowario[m]
there are ~90 peers on wow network, by how much should I increase it?
-
wowario[m]
are you referring to DROP_PEERS_ON_SCORE?
-
wowario[m]
or context.m_score (5)?
-
moneromooo
DROP_PEERS_ON_SCORE and score decrease by 5.
-
moneromooo
DROP_PEERS_ON_SCORE is 10 IIRC, which means you need two fails to drop.
-
moneromooo
The more out peers you have on a node, the less likely it is each peer is tested. Monero has 12 atm.
-
wowario[m]
DROP_PEERS_ON_SCORE -2
-
moneromooo
Ah, right, so a failure drops score by 1, takes two failures to drop the connection.
-
moneromooo
When it drops, it increases hte ban score by 5, and the peer gets banned at 10.
-
moneromooo
So 4 fails in total to get banned.
-
wowario[m]
we've increase P2P_DEFAULT_CONNECTIONS_COUNT to 12
-
wowario[m]
change DROP_PEERS_ON_SCORE to -5?
-
wowario[m]
-
moneromooo
That'd drop them even less. You want -1 if you want to test more aggressively.
-
moneromooo
And replace 5 with 10 in the "drop_connection_with_score" call.
-
moneromooo
Then a single fail should ban.
-
moneromooo
Which is a bit harsh.
-
wowario[m]
-
gingeropolous
is logging thorough for these new functions? running on wownero network will help determine false positive rate - just off the cuff, i doubt wownero is being actively spied on / attacked.
-
gingeropolous
so i guess i mean logging regarding ability to see which peers are getting banned
-
gingeropolous
wownero also has a longer blocktime though. dunno how that factors in
-
wowario[m]
5 min blocktime
-
moneromooo
The longer the block time, the slower peers are tested.
-
moneromooo
For logs, you grep for waiting\|bad\ peer (INFO level).
-
gingeropolous
hrm, how can we mimic the attack? would running a node with --no-sync do it?
-
moneromooo
No.
-
n3ptune
could you add a monero AHP as a wownero peer? if the protocol is the same or similar enough
-
moneromooo
Doubt they'll oblige, given they're malicious in the first place.
-
yanmaani
what prevents the spy nodes from relaying blocks though?
-
moneromooo
Nothing. It just makes them conspicuous, which is odd.
-
moneromooo
Now they'll start hiding.
-
moneromooo
Occam's razor says they just could rent those boxes cheaper :)
-
moneromooo
wowario[m]: another you might want: 6944
-
xmr-pr
moneromooo-monero opened pull request #6944: protocol: drop peers which repeatedly don't reply to chain requests
-
xmr-pr
-
selsta
14:13 <gingeropolous> is logging thorough for these new functions? running on wownero network will help determine false positive rate - just off the cuff, i doubt wownero is being actively spied on / attacked. <-- I did test for false positives on monero network and did not have a single peer have their score decreased in 12+ hours
-
selsta
so looks good, the 20 seconds waiting time is quite generous, usually blocks are relayed in less than a second
-
moneromooo
I had a fluffy block from a peer 1.5 minutes after everyone else. Shit happens from time to time.
-
selsta
right, not saying we should decrease the 20 seconds
-
sech1
btw I did a transaction this morning and it got relayed only after ~2 minutes, is this normal?
-
sech1
I have 64 peers out/20-30 in usually
-
selsta
normal?
-
sech1
Isn't 2 minutes too slow for tx propagation?
-
selsta
dandelion?
-
sech1
yes
-
selsta
all these spy nodes drop transactions so yes it is normal currently
-
sech1
I banned spy nodes, but I guess next node in the chain didn't
-
selsta
yep
-
selsta
so we have to put out a release soon and hope that many upgrade
-
selsta
plus manually ban them from as many nodes as possible
-
selsta
which reduce how often they show up in peer lists
-
selsta
should reduce*
-
xmr-pr
MoneroArbo opened issue #6945: "Edit" and "Copy" buttons in Account and Receive tabs are not visible ...
-
xmr-pr
-
dEBRUYNE
selsta: Perhaps it would be worthwhile to issue a mailing list message
-
vtnerd
selsta : there isn't much of a fix for what the user described. 2 minutes is within the expectation for dandelion++ timeout
-
vtnerd
or I see, if everyone bans spying nodes it would possibly improve
-
hyc
that seems to be the hope, but sounds unrealistic to me
-
vtnerd
yeah they'll likely react somehow
-
vtnerd
the current PRs - which I plan to comment on shortly (hopefully) - would force them to use more disk+memory+cache I/O, so there's less "asymmetric warfare" going on with the number of connections they have vs honest nodes
-
vtnerd
*they can support. although, dunno yet there are some moves around that too though
-
hyc
that sounds all promising. if fake nodes are forced to do as much work as real nodes anyway, we've succeeded.
-
M5M400
not sure is that has any repelling effect. the work a node does is pretty negligable imo. at least cpu/io wise
-
moneromooo
I think measuring the time-to-fluff might be the way to go after that. A long time means one node along the way dropped it. Maybe not the first one you're connected to, but one of those it's connected to, or recursively.
-
moneromooo
Dropping the first one means that overall, if everyone's doing the same thing, *some node somewhere* will be dropping the bad one.
-
moneromooo
Then it won't drop it again, and other nodes should start accreting.
-
vtnerd
was thinking about that. Would have to think about leaking path information via timings of switching. Should be difficult to identify without active txes
-
moneromooo
Actually, it might drop it again, since the length of the stem phase is random, so it'd have to be a threshold. Do more than N% of the stem txes I sent this peer get unreasonably delayed ?
-
moneromooo
It might end up unstable.
-
vtnerd
oh sorry I zoomed through your message a bit since it was similar to my idea
-
vtnerd
I was thinking instead of dropping the peer, just "re-roll" the selection on which outbound peer is used
-
vtnerd
because the next hop might be legit, so its not a complete turnover on connection
-
vtnerd
you might be able to score against that, because the next hop shouldn't keep selecting the next peer, but I dunno
-
vtnerd
deviates from the algorithm a bit, I'll dig into what grin has been doing
-
xmr-pr
moneromooo-monero opened pull request #6946: protocol: prefer cycling low score peers
-
xmr-pr
-
xmr-pr
moneromooo-monero opened pull request #6947: add a convenience script to start monero with inbound tor
-
xmr-pr
-
moneromooo
gingeropolous: do you have a long lived hidden service monerod ?
-
moneromooo
(or anyone else)
-
hyc
mine is
-
moneromooo
Address ?
-
hyc
hm, lemme dig it up
-
hyc
2xmrnode5itf65lz.onion
-
moneromooo
ty
-
moneromooo
Port is 18083 ?
-
hyc
18081
-
moneromooo
Sorry, I meant P2P, that's RPC, is it ?
-
hyc
oh, yes rpc only
-
hyc
I could add p2p too I guess
-
hyc
why 18083?
-
moneromooo
(reason being 6947 above)
-
moneromooo
Because that's what's in the doc, so easier :)
-
hyc
ok lemme tweak torrc
-
moneromooo
I guess it's in the docs because it's the first one free after zmq.
-
hyc
ok try it
-
hyc
reminds me. we have --rpc-bind-port and --rpc-restricted-bind-port, but only --rpc-bind-ip
-
hyc
would be nice to have --rpc-restricted-bind-ip
-
hyc
then could keep unrestricted bind-port open on localhost, and restricted-bind-port open on 0.0.0.0
-
dEBRUYNE
I think smeone proposed that too on Github
-
dEBRUYNE
I remember there being an issue for it
-
hyc
and maybe ignore --confirm-external-bind on the latter, since it's restricted anyway
-
hyc
igonre: don't require
-
hyc
hm, looking at issues now
-
moneromooo
I seem to be connecting, but it's closing the connection, failing to handshake.
-
moneromooo
It's connecting fine to other tor nodes tohugh.
-
hyc
hmm
-
hyc
I've never tested p2p
-
hyc
anything useful we can turn on in logging from this side?
-
moneromooo
Oh, it connected now. Then complains about bad zone. Probably my fault here.
-
hyc
all I'm doing is having tor forward to localhost:18080
-
moneromooo
Oh, so it thinks it's on clearnet, then sending clearnet peers.
-
moneromooo
Explains.
-
hyc
what do I need to do instead?
-
moneromooo
-
hyc
ok
-
moneromooo
They're from ANONYMITY_NETWORKS.md
-
moneromooo
Should be: --tx-proxy tor,127.0.0.1:9050,10 --anonymous-inbound 2xmrnode5itf65lz.onion:18083,127.0.0.1:18083,25
-
moneromooo
Tweak ports as necessary.
-
hyc
ok
-
hyc
ok try again
-
moneromooo
Works, thanks :)
-
hyc
hm, I didn't have that control socket stuff enabled in torrc. restarting tor again
-
hyc
ok, running again
-
hyc
ah found it, issue #6369